Red Hot Cyber. The Cybersecurity Blog
Featured Articles

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Anthropic has released Claude Opus 4.5 , its new flagship model, which the company says is the most powerful version yet and ranks at the top of the class for practical programming, agent-based produc...

On November 24, Alibaba announced Qwen3Max, which had been in public beta for a week , and had already surpassed 10 million downloads. It was a record that shattered all others. In a very short time, ...

Remote work has given employees freedom , but with it has also come digital surveillance . We discussed this some time ago in an article, reporting that these monitoring tools are also coming to Micro...

On November 13, Eurofiber France, a respected provider of fiber optic network and VPN solutions to many of France’s leading companies, discovered that its systems had been compromised by criminal ha...
China dominates industrial robotics: 2 million machines in factories
RDP Services Exposed in the Crosshairs! A Botnet of 100,000 IPs Scans the Network
Everyone’s Hacking iPhones! Apple Increases iOS Reward to $5 Million
Artificial intelligence = Alcohol for teens! It damages social and cognitive skills
Velociraptor used in active attacks to distribute LockBit and Babuk ransomware
SonicWall confirms data breach. Cloud backup service customers at risk.

China dominates industrial robotics: 2 million machines in factories
Redazione RHC - October 12th, 2025
China is consolidating its position as a global manufacturing powerhouse thanks to an unprecedented pace of production and installation of industrial robots. According to a report by the International Federation...

RDP Services Exposed in the Crosshairs! A Botnet of 100,000 IPs Scans the Network
Redazione RHC - October 11th, 2025
In the United States, a large-scale, coordinated botnet campaign is targeting Remote Desktop Protocol (RDP)-based services. The scale and organizational structure of this campaign poses a significant threat, especially for...

Everyone’s Hacking iPhones! Apple Increases iOS Reward to $5 Million
Redazione RHC - October 11th, 2025
Apple has significantly expanded its bounty program for security vulnerabilities in the iOS ecosystem. At the Hexacon offensive security conference in Paris, Ivan Krstic, the company's vice president of security...

Artificial intelligence = Alcohol for teens! It damages social and cognitive skills
Redazione RHC - October 11th, 2025
Today's students are increasingly turning to artificial intelligence, not only for study aids, but also for social interaction and emotional support. A new study from the Center for Democracy and...

Velociraptor used in active attacks to distribute LockBit and Babuk ransomware
Redazione RHC - October 11th, 2025
Hackers have begun using Velociraptor , the digital forensics and incident response (DFIR) tool, to launch LockBit and Babuk ransomware attacks. Cisco Talos researchers attribute these campaigns to the Storm-2603...

SonicWall confirms data breach. Cloud backup service customers at risk.
Redazione RHC - October 11th, 2025
SonicWall confirmed that a data breach last month affected all customers using the company's cloud backup service. As a result, firewall configurations stored on MySonicWall were compromised. MySonicWall is a...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

